+ All Categories
Home > Technology > InDefend-Integrated Data Privacy Offerings

InDefend-Integrated Data Privacy Offerings

Date post: 14-Jul-2015
Category:
Upload: data-resolve-technologies-pvt-ltd
View: 117 times
Download: 0 times
Share this document with a friend
15
inDefend-Business Integrated Data Privacy Offerings Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM www.dataresolve.com
Transcript
Page 1: InDefend-Integrated Data Privacy Offerings

inDefend-Business Integrated Data Privacy Offerings

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM

www.dataresolve.com

Page 2: InDefend-Integrated Data Privacy Offerings

Agenda

Insider Threat Challenges

Understanding Insider Threats and Trends

What 3rd Party Assessment Reported

Employee DNA – Data Privacy Standpoint

What’s the approach moving forward?

Data Resolve Offerings, Architecture & Differentiators

About Data Resolve

Customer Speaks

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 2

Page 3: InDefend-Integrated Data Privacy Offerings

Insider Threats Reporting Challenges

Are we able to monitor employee behavior before s/he leaks the information?

Are we able to assess his / her productivity vis-a-via organization goals?

Are we able to enforce strong BYOD controls?

Are we getting integrated view of employee activities from multiple service points that doesn’t fall under DLP purview?

Are training sessions/ simulations games prevented insider threats?

Insider threat is impossible to counter because of the insider’s resources and access permissions?

Do business takes responsibility of these challenges?

Are we able to catch disgruntled or employee’s/contractors with mal-intent well before?

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 3

Page 4: InDefend-Integrated Data Privacy Offerings

Let’s Look at What Research Says – Ineffectiveness (Cont.)

Alarming facts:

More than 50% of the service provider organisations revealed that insiders who do not work in IT department and consequently do not have privileged access have carried out insider incidents at their organisations.

As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat.

Audit and review is still the primary source of identification and learning about insider incidents with around 89% service provider organisations and 75% client organisations being alerted about insider incidents at service provider organisations through this method.

Source: PWC-DSCI Study

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 4

Page 5: InDefend-Integrated Data Privacy Offerings

Let’s Look at What Research Says – Ineffectiveness (Cont.)

Source: PWC-DSCI Study

5

Page 6: InDefend-Integrated Data Privacy Offerings

As per 89% of the service provider organisations, behavioural motivation to break existing norms is the primary motive that leads to insider threat.

Let’s Look at What Research Says – Ineffectiveness

Source: PWC-DSCI Study Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 6

Page 7: InDefend-Integrated Data Privacy Offerings

Employee DNA – Data Privacy Standpoint Employee Viewpoint:

So many data privacy trainings, enablement in progress, now I have one DLP client as well. Don’t you trust me?

Am not happy as am tied with so many security control, allow me to breathe.

Every-time you ask me to enforce rights on documents that am sharing with externals partners, this is part of my job.

CISO Viewpoint: As a CXO how do we ensure we monitor, protect this data lifecycle from a single pane of glass, I have so many tools to manage now

Difficult to get an integrated view across messengers, chats, social sites, BYOD devices, web services, cloud services, rights management, mobile behaviour analysis and its increasing . .too much on the table.

Who did what, how, what went out, why we couldn’t stop it; study says it takes hours to identify this from set of people monitoring alarms from DLP…is it effective?

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 7

Page 8: InDefend-Integrated Data Privacy Offerings

Our Recommended Approach

Build an integrated data privacy control framework that addresses all these challenge's proactively….

Approach should tie up all end – points and data movements be it mobile, handheld, end-points, irrespective of where data goes

Reduce burden on end-users and departments when it comes to there involvement, define boundaries and react

Empower business heads so they take there own decisions with right information

Reduce monitoring foot-print from multiple controls to one

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 8

Page 9: InDefend-Integrated Data Privacy Offerings

Data Resolve Offerings

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 9

inDefend Integrated Data Privacy Platform mitigates risks associated with information life-cycle:

Platform mitigates risks associated with data movement within and outside organization boundaries

Platform covers all end-points – tablets, mobiles, end-point computing devices

Integrated security analytics layer provide view on the fly for data moving outside to trusted and untrusted users

Provide forensics, investigation support with due-diligence

Enforced employee monitoring and behaviour analysis

Data Privacy Analytics platform on exiting vendor products.

Centralized Cloud Delivery Model

Stack covers: Data Leak Prevention

Information Rights Management

Mobile Workforce Management

Employee Behaviour Monitoring

Enforced Encryption

Employee Forensics

Asset Management & Monitoring

Page 10: InDefend-Integrated Data Privacy Offerings

Offerings Architecture

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 10

Page 11: InDefend-Integrated Data Privacy Offerings

Intelligence Factors

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 11

The intelligence of the solution lies in the approach of automatic detection of all the sensitive events generated in the network, and presentation to the administration and top management in the following ways:

Cyber Intelligence Sensors

– Social network styled alerts

Daily Email Reports *

– Summary of alerts generated throughout the day

Real-time SMS Alerts*

– SMS Notification sent for the most sensitive activities happening in your network

Cyber Intelligence Reports*

– Advanced insights are provided into your organization’s activities and recommendations are given to improve processes

Screenshot Monitoring*

–Periodic screenshots of end-user’s desktop activities

Cyber Seal*

–Provide departments real-time data violation status

Page 12: InDefend-Integrated Data Privacy Offerings

Differentiators

Integrated client

Stealth supported

Less foot-print on machine (Less than 10% run-time memory utilization)

Multiple OS support (Windows family, Ubuntu, Linux, Android, IOS)

Cloud supported

Encrypted communication (external storage devices with white-labelled approach + partial disk)

Centralized policy roll-out

Offline support

Integrated architecture enforces real-time blocking across data life-cycle that is missing in disparate vendor approach

Customized Reporting (This integrates with your organization business processes and a customized approach that no one delivers)

Integrated dashboard for advanced analytics

DLP Analytics (Reduced cost to manage data privacy operations)

Enforced external drive encryption (external storage devices with white-labelled approach + partial disk)

Enforced rights management (on the fly enforced options on edit, print, forward, up-load, wipe out, print-screen options)

Employee Forensics

Employee monitoring and productivity analysis

Focus on Co-creation

Advanced mobile workforce management module

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM

End - Point

Architecture

Reporting

Advanced Features

12

Page 13: InDefend-Integrated Data Privacy Offerings

About Us Incubated in IIT Kharagpur

Focused on addressing data theft, data loss with security analytics from on-premise and cloud platform,

product christened as “inDefend” targeted for Enterprise, SMB and End-Consumers

TIE, Kolkata selected the company as best emerging IT Company from West Bengal

70+ enterprise customers

50000+ retail product downloads

Customers in 15+ industry segments

6 million+ work hours analyzed

1000+ alerts generated daily

CEO & Founding Team Member Alma-Mater –IIM-Kolkata

CTO & Founding Team Member Alma-Mater –IIT-Kharagpur

Strategic Alliance Lead & Founding Team Member Alma-Mater –IIT-Kharagpur

Client Relationship Lead & Founding Team Member Alma-Mater – IIT-Kharagpur

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM

Leadership Team

Our Awards

13

Page 14: InDefend-Integrated Data Privacy Offerings

Customer Speaks

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM 14

"Easier for IT to track and stop unprofessional activity of the users. Support is excellent.“

- IT Manager, Mid-sized ITeS company, Kolkata

"Indefend is exceptional from any other product available in the globe, i have tested many security

software but the features as mentioned in those software's does not meet when it comes to

practical testing. Indefend meets all the features as mentioned and works perfectly. The technical

support is prompt and very responsive.”

- Senior IT Administrator, Mid-sized ITeS company, Kolkata

"In-defend Enterprise has been the best experience I've ever had in solving issues of Data Security.

Ive tried many other products but in-defend gave me the best solution. Also the constant upgrade of

its features and it excellent customer support team gives me much confidence in Data Resolve

Technologies and shows how competent they are in delivering their goals.“

- IT Operations Manager, Petroleum Engineering company, Nigeria

Client Testimonials

70+ enterprise customers

13 countries covered

Customers in 15+ industry segments

6 million+ work hours analyzed

1000+ alerts generated daily

Page 15: InDefend-Integrated Data Privacy Offerings

Thank You!!

Our Award Winning Product

Data Forensics | Employee Monitoring | Encryption | Analytics | Productivity Control | IRM | DLP | MWM

Website www.dataresolve.com www.indefend.com Demo https://cloud.indefend.com/ Email [email protected]


Recommended